Sciweavers

5547 search results - page 1023 / 1110
» Software Variability Management
Sort
View
USENIX
2008
15 years 8 days ago
Protection Strategies for Direct Access to Virtualized I/O Devices
Commodity virtual machine monitors forbid direct access to I/O devices by untrusted guest operating systems in order to provide protection and sharing. However, both I/O memory ma...
Paul Willmann, Scott Rixner, Alan L. Cox
CIKM
2008
Springer
14 years 12 months ago
Learning a two-stage SVM/CRF sequence classifier
Learning a sequence classifier means learning to predict a sequence of output tags based on a set of input data items. For example, recognizing that a handwritten word is "ca...
Guilherme Hoefel, Charles Elkan
CIKM
2008
Springer
14 years 12 months ago
Efficient sampling of information in social networks
As online social networking emerges, there has been increased interest to utilize the underlying social structure as well as the available social information to improve search. In...
Gautam Das, Nick Koudas, Manos Papagelis, Sushruth...
IPCC
1998
92views more  IPCC 1998»
14 years 11 months ago
Evaluating Distance Learning in Graduate Programs: Ensuring Rigorous, Rewarding Professional Education
: Internet-based distance learning programs make it possible for technical communicators located anywhere in the world to participate in graduate courses in their field. But are th...
George F. Hayhoe
DAIS
1997
14 years 11 months ago
A System for Specifying and Coordinating the Execution of Reliable Distributed Applications
An increasing number of distributed applications are being constructed by composing them out of existing applications. The resulting applications can be very complex in structure,...
Frédéric Ranno, Santosh K. Shrivasta...
« Prev « First page 1023 / 1110 Last » Next »